Encryption is the process of converting a plaintext message into ciphertext which can be decoded back into the original message.
An encryption algorithm along with a key is used in the encryption and decryption of data.
There are several types of data encryptions which form the basis of network security.
Encryption schemes are based on block or stream ciphers.

The type and length of the keys utilized depend upon the encryption algorithm and the amount of security needed.
In conventional symmetric encryption a single key is used.
With this key, the sender can encrypt a message and a recipient can decrypt the message but the security of the key becomes problematic.
In asymmetric encryption, the encryption key and the decryption key are different.
One is a public key by which the sender can encrypt the message and the other is a private key by which a recipient can decrypt the message.

Asymmetric encryption algorithm.
A modern branch of cryptography. also known as public-key cryptography in which the algorithms employ a pair of keys (a public key and a private key)
and use a different component of the pair for different steps of the algorithm.

Block cipher.
These algorithms work on chunks of specific sized data along with a key resulting in blocks of cipher text.
The National Institute of Standards and Technology (NIST) is a federal agency
that approved the Data Encryption Standard (DES) block cipher an early encryption algorithm created in the mid 1970s.
The American National Standards Institute (ANSI) also set this security algorithm as the Data Encryption Algorithm (DEA) standard.
Another standard developed in the 1980s is the Triple Data Encryption Standard (3DES).
Some commonly used block cipher algorithms are IDEA, RC2, RC5, CAST and Skipjack.

CBC, Cipher Block Chaining.
Encryption mode.

CBD, Cipher block chaining mode.
The results of the previously chained block is used in the encryption of the next chained block.

CCM, Counter with CBC-MAC.
Encryption mode.
A generic authenticated encryption block cipher mode.
This mode is defined for use with 128-bit block ciphers such as AES.

Ciphertext.
The resulting encrypted message produced by a cipher algorithm.

CTR, Counter.
Encryption mode.

Decryption.
The process of making a encrypted message recognizable with a cipher algorithm.

ECB, Electronic Code Book.
Encryption mode.

Encryption.
The process of making a message unrecognizable with a cipher algorithm.

Encryption key.
A sequence of values that are used with a cipher algorithm to encrypt a message.
The choice of random (or cryptographically pseudorandom) keys, a
secure key exchange mechanism, frequent key refreshments, and good secrecy
protection of keys are all essential ingredients for the security of the integrity verification mechanism.

OFB, Output FeedBack.
Encryption mode.

Plaintext.
An unencrypted message.

Private key.
(RFC 2828)
The secret component of a pair of cryptographic keys used for asymmetric cryptography.
In a public key cryptosystem that key of a user's key pair which is known only by that user.

Public key
A public key which encrypts a message.
(RFC 2828)
The publicly-discloseable component of a pair of cryptographic keys used for asymmetric cryptography.
In a public key cryptosystem, that key of a user's key pair which is publicly known.

Public key encryption.
An encryption mechanism where two keys are used.
A public key is used to encrypt the message and a secret private key to decrypt the message.

Secret key.
A single secret key which is used in conventional symmetric encryption which is used to encrypt and decrypt a message.

SIV, Synthetic Initialization Vector.
Block cipher mode of operation.
(RFC 5297)
SIV takes a key, a plaintext, and multiple variable-length byte strings that will be authenticated but not encrypted.
It produces a ciphertext having the same length as the plaintext and a synthetic initialization vector.
Depending on how it is used, SIV achieves
either the goal of deterministic authenticated encryption or the goal of nonce-based, misuse-resistant authenticated encryption.

Stream cipher.
A symmetric encryption algorithm that processes the data a bit or a byte at a
time with a key resulting in a randomized ciphertext or plaintext.
Some commonly used stream cipher algorithms are RC4 and W7.

Symmetric encryption algorithm.
The encryption key and the decryption key are interrelated and may even be the same.